Professional Documents
Culture Documents
Computer Virus
Computer Virus
Computer Virus
by Douglas A. Turner, Esq.
With the recent events at home and abroad, we can do very well without any
more threats to our security. The World Trade Center and Pentagon plane
crashes, the Anthrax scare, and the wars in Afghanistan and Iraq are enough to
put us all at the edge of our seats. And if our computers were alive, they’d
probably feel the same way, too.
Of course, terrorism is nothing new. Neither are computer viruses. The concept
of a computer virus can be traced all the way back to 1949 when the Hungarian-
American mathematician John Von Neumann, at the Institute for Advanced Study
in Princeton, New Jersey, proposed that it was theoretically possible for a
computer program to replicate. In the 1950s, Bell Laboratories tested the theory
by means of a game called Core Wars. The game involved players who created
tiny computer programs that attacked, erased and tried to propagate on an
opponent's system. The term virus was coined 33 years later by an American
electrical engineer (Fred Cohen) to describe a self-replicating computer
program.1 The rest is, shall we say, history.
Today, there are more than 58,000 virus threats -- more than most of us would
ever imagine could exist. Although a number so large is enough to cause the
hairs on our backs to stand on end, we need not lose sleep over it. Proper
knowledge and background information - and of course, preparation - are our
best defense against this threat.
First things first, a virus is a malicious code but not all malicious codes are
viruses. The major/common types of malicious codes are the Virus, the Trojan
Horse, and the Worm. Each is described in brief below. With respect to each,
however, it is important to bear in mind that a malicious code is merely a
computer program crafted by another human being. He or she may be a
researcher, a prankster, an outright vandal, a neophyte to the world of
programming, a hobbyist, a complete loony or a genius. Regardless, he or she is
still a human being who can (and eventually will) be outsmarted by other
programmers. Many of these programmers work for anti-virus companies.
Some of the most widely-known anti-virus companies are Symantec (Norton),
McAfee, Trend Micro (PCcillin), AVG, and F-Secure.
Trojan Horse. This harmful computer program was named after the popular
wooden horse the Achaeans used to fool – and eventually destroy – the people
of Troy. It usually appears to be innocent-looking and interesting, such as a
game or screen-saver, but when runs, it can do many nasty things such as delete
files, capture user-names and passwords (and send them to another person), or
allow a hacker to control your system. It does not replicate itself, however, and it
cannot execute itself unless a user actually runs or executes the code that
triggers it.
False Threats. There are real threats and there are false threats. Hoaxes
spread like wildfire in the internet via forwarded mails – courtesy of users who
believe the virus warnings received from friends, relatives, or colleagues. Signs
that a virus warning is probably a hoax would include a message with (1) a tone
of urgency and even panic; (2) a claim that the government or an authoritative
company has issued the warning; and (3) urgent advice to send it everyone you
know. Not only do these forwarded mails cause unnecessary traffic in the
information superhighway, they can also be carriers of some real viruses. In
addition, hoaxes and chain letters may be used by spammers (bulk mailers of
unsolicited mail) to harvest legitimate e-mail addresses for their use. Remember
that, instead of believing and forwarding these messages, it is always safer to
check out the anti-virus sites for latest updates on virus alerts and also hoax sites
such as VMyths.com and Hoaxbusters for verification.
It is also very helpful to be vigilant in all respects. Be aware that the people who
create viruses can use known hoaxes to their advantage. A good example is the
AOL4FREE hoax. This began as a hoax warning about a nonexistent virus. Once
it was known that this was a hoax, somebody began to distribute a destructive
trojan horse (recall that a trojan horse differs from a virus in that it does not
reproduce itself) in a file named AOL4FREE, which was attached to the original
hoax virus warning!”
Finally, after all is said and done, we must remember Nick's First Law of
Computer Virus Complaints: Just because your computer is acting strangely
Monday, July 28, 2003 4
or one of your programs doesn't work right, this does NOT mean that your
computer has a virus.3
1
Microsoft® Encarta® Encyclopedia 99. © 1993-1998 Microsoft Corporation.
2
"Virus (computer)," Microsoft® Encarta® Encyclopedia 99. © 1993-1998 Microsoft Corporation.
3
www.faqs.org